ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00794
memcached contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Thu, 18 Jan 2024 05:05:49 +0000 (UTC)
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r257c6e6c224a (arm64; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision r2705869b18b4 (arm64; channels: 1.5-20.04_beta, 1.5-20.04_edge)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision r2c7773c0cc2b (ppc64le; channels: latest, edge, 1.6-23.04_beta, 1.6-23.04_edge)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision r6dbee1e61f6d (amd64; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision r94638a10e376 (s390x; channels: 1.5-20.04_beta, 1.5-20.04_edge)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision r9de685550bc6 (ppc64le; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision rba05f11e9fff (s390x; channels: latest, edge, 1.6-23.04_beta, 1.6-23.04_edge)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision rbd46db64035e (amd64; channels: 1.5-20.04_beta, 1.5-20.04_edge)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision rcef1a351c5e5 (ppc64le; channels: 1.5-20.04_beta, 1.5-20.04_edge)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision rf89470f6fc1a (arm64; channels: latest, edge, 1.6-23.04_beta, 1.6-23.04_edge)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision rff3fe81ee92a (s390x; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Revision rff631885ad88 (amd64; channels: latest, edge, 1.6-23.04_beta, 1.6-23.04_edge)
* libpam-modules: 6588-1
* libpam-modules-bin: 6588-1
* libpam-runtime: 6588-1
* libpam0g: 6588-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-6588-1/
Follow ups